Security analysis of two certificateless short signature schemes

被引:4
|
作者
Du, Hongzhen [1 ]
Wen, Qiaoyan [2 ]
机构
[1] Baoji Univ Arts & Sci, Dept Math, Baoji 721013, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
GENERIC CONSTRUCTION; EFFICIENT; MODEL;
D O I
10.1049/iet-ifs.2013.0080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key cryptography (CL-PKC) combines the advantage of both traditional PKC and identity-based cryptography (IBC) as it eliminates the certificate management problem in traditional PKC and resolves the key escrow problem in IBC. Recently, Choi et al. and Tso et al. proposed two different efficient CL short signature schemes and claimed that the two schemes are secure against super adversaries and satisfy the strongest security. In this study, the authors show that both Choi et al.'s scheme and Tso et al.'s scheme are insecure against the strong adversaries who can replace users' public keys and have access to the signing oracle under the replaced public keys.
引用
收藏
页码:230 / 233
页数:4
相关论文
共 50 条
  • [21] Cryptanalysis and Improvements of Two Certificateless Signature Schemes with Additional Properties
    Nong, Qiang
    Hao, Yanhua
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 54 - 58
  • [22] Security analysis of a security-enhanced certificateless signature scheme
    Yang, Xiaodong
    Wang, Jinli
    Chen, Chunlin
    Li, Ting
    Wang, Meiding
    Wang, Caifen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2029 - 2033
  • [23] Security analysis of choi et al.'s certificateless short signature scheme
    Chen, Yu-Chi
    Tso, Raylin
    Horng, Gwoboa
    Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154
  • [24] Efficient certificateless signature and group signature schemes
    Chen, Hu
    Zhu, Changjie
    Song, Rushun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (02): : 231 - 237
  • [25] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968
  • [26] On the security of pairing-free certificateless digital signature schemes using ECC
    Tiwari, Namita
    ICT EXPRESS, 2015, 1 (02): : 94 - 95
  • [27] Certificateless designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 15 - +
  • [28] Certificateless Aggregate Signature Schemes: A Review
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 531 - 536
  • [29] On the security of two group signature schemes with forward security
    Kim, Kitae
    Yie, Ikkwon
    Nyang, Daehun
    Informatica (Ljubljana), 2010, 34 (02) : 237 - 242
  • [30] On the Security of Two Group Signature Schemes with Forward Security
    Kim, Kitae
    Yie, Ikkwon
    Nyang, Dachun
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (02): : 237 - 242